Sciweavers

5918 search results - page 1115 / 1184
» A view of cloud computing
Sort
View
ICCV
2011
IEEE
13 years 10 months ago
Learning Universal Multi-view Age Estimator by Video Contexts
Most existing techniques for analyzing face images assume that the faces are at near-frontal poses. Generalizing to non-frontal faces is often difficult, due to a dearth of groun...
Zheng Song, Bingbing Ni, Dong Guo, Terence Sim, Sh...
ICCV
2011
IEEE
13 years 10 months ago
Discovering Object Instances from Scenes of Daily Living
We propose an approach to identify and segment objects from scenes that a person (or robot) encounters in Activities of Daily Living (ADL). Images collected in those cluttered sce...
Hongwen Kang, Martial Hebert, Takeo Kanade
ASIACRYPT
2011
Springer
13 years 9 months ago
BiTR: Built-in Tamper Resilience
The assumption of the availability of tamper-proof hardware tokens has been used extensively in the design of cryptographic primitives. For example, Katz (Eurocrypt 2007) suggests ...
Seung Geol Choi, Aggelos Kiayias, Tal Malkin
CBSE
2011
Springer
13 years 9 months ago
Rectifying orphan components using group-failover in distributed real-time and embedded systems
Orphan requests are a significant problem for multi-tier distributed systems since they adversely impact system correctness by violating the exactly-once semantics of application...
Sumant Tambe, Aniruddha S. Gokhale
DGO
2011
285views Education» more  DGO 2011»
13 years 9 months ago
Social media use by government: from the routine to the critical
Social media (i.e., Twitter, Facebook, Flickr, YouTube) and other services with user-generated content have made a staggering amount of information (and misinformation) available....
Andrea L. Kavanaugh, Edward A. Fox, Steven D. Shee...
« Prev « First page 1115 / 1184 Last » Next »